background
THE HAXOR NEWS
Powered by Blogger.

The Tech Virus

  • home
  • Technology
    • Sub Menu 1
    • Sun Menu 2
    • Sub Menu 3
    • Sub Menu 4
  • Follow
    • Follow us on Twitter
    • Find us on Facebook
  • Sports
    • Sub Menu 1
    • Sun Menu 2
    • Sub Menu 3
    • Sub Menu 4
  • Contact me
    • Contact us
  • Download SpiceMag 1.1

    Facebook Fanpage

    Recent Posts

    Categories

    • Cyberspace
    • Defacement
    • Online Earning
    • SEO
    Showing posts with label Cyberspace. Show all posts

    Solar Powered Watch Can Charge Your  Phone




    If you’ve ever required power on the go however don’t wish to lug a transportable charger around, a replacement Kickstarter project might offer the solution. the intense minds behind Startup EnergyBionic have ill-treated a star charger on a wristband to relinquish you sun-powered juice for your phone. referred to as Carbon, the wearable charger can price $95 if you back the project currently. The device is calculable to ship in August 2014, if the project is funded by March thirty one. 

    Don’t be fooled into thinking this functions as a watch. Carbon is solely a cell engineered into what feels like a watch face. A charging port, semiconductor diode indicator and button line the perimeters. The multi-color semiconductor diode lightweight flashes to point battery charge level, charging standing and may even act as a mini torch or safety strobe light after you would like it. Carbon is additionally dirt and waterproof.
    According to Cisco report that might make Shocking news for users of the world's most popular mobile OS.

    Add caption


    The report said that 99% of mobile malware is pointed at the Android mobile OS, and that 71% of all malicious websites target Google's mobile OS.

    The news conflict claims made by Google executive chairman, who raised that news in October 2013 when he told a Gartner symposium Not secure? It's more secure than the iPhone, without quantifying the statement.

    Cisco makes the claim in its Annual Security Report for 2014, which also reports that 91% of web exploits target Java and most are attributable to users failing to update the Java runtime to the latest version. In fact, Cisco found that 76% of users of its own security products were found to be running an end of life version of Java.

    But the volume of Email spam continues to decline, and the percentage of spam with infected payloads, as opposed to advertisements for casinos and viagra, has remained constant. In simple words, there is less of it, but it is just as nasty.


    The news that Android is targeted so heavily will not surprise most analysts. A recent report of the Google Play store shows that it remains populated with copied apps and spam notification. Users are often call  Google to sort out its Android app store more effectively, but they had maintained that would go against the open source option of Android. It has, now, start to remove malicious apps reactively.
    In a recent survey from Facebook regarding security, the facebook let the world know a fact almost 0.6 million security threats per day in the form of compromised user logins. That's a small 0.06 percent of the 1 billion logins the site sees daily, although it's still a sizable number.




    While some will says to these security breaches as "hacks," but Facebook doesn't classified the compromised logins in that way.

    A compromised login' means the person logging through others account by knowing their username and password, but we suspect they may not be the actual account holder, according to Fred Wolens, a public representative of Facebook.Because, knowing someone's username and password is not enough to get into his Facebook account if we are not confident that the person accessing the account is its original owner. It may be better to say 0.6 million accounts 'saved' per day.

    Every time when this happens, we don't let the suspicious person to login into the account, and instead make them to pass some additional authentication challenge.Usually this involves a social Captcha, which Confirm the account owner by having them identify tagged pictures of their friends.Accounts are often compromised outside the Facebook system (Like phishing, malware, sharing their password on a site that was Hacked, etc.)

    It's very bad that another person get access to your account and wreak havok on your friends or steal your personal information,check your past credential  but it's also possible that the Hacker could change your password and lock you out of your account.

    In a event, Facebook's response to implement new security measures, one of which is Called Trusted Friends, one of the new features will let users name up to five trusted friends who, in the event the user gets locked out of his or her account, will receive a code that can be passed on to the user to authenticate the account and identity.


    The analogy Facebook is using is: It's like giving a copy of your house key to a family member or close friend. It's a good Security step that works when you've forgotten your password (or a malicious person has changed the password on you) and you can't access your email to reset the password yourself. When that happens, Facebook could send a code to your trusted friends who can pass it along to you by some other means, like by phone or SMS.



    Vigo is a Bluetooth headset that measures blinks and body movements to warn users if they are getting too drowsy. 

    The device could be potentially life-saving for drivers and other situations where concentration is vital. 

    Vigo is currently on Kickstarter and has already raised more than $38,000 of its $50,000 goal, and with 15 days are still left, it was a good chance of getting funded. 

    The device’s starting price is a very reasonable only $59.

    The Experts behind Vigo say that the average eye blink happens in 1/5 of a second, but tha headset tracks over 20 parameters in your blinks and watches how these variables change.

    If Vigo thinks user is getting too drowsy, it will alert user by vibrating and blinking its LED light or playing a song through the headpiece. 

    Vigo also lets you save different events according to their time such as driving and studying, and then saves the data so you can know what times of day you tend to get tired. 

    The device works on same principle as other Bluetooth headset and allow users to take incoming calls. 



    By using Coffee & energy drinks we keep us from dozing off, but the most reliable way to stay alert was having a buddy next to us that could watch when we were losing our focus and nudge us when we started to doze off.
    If you are a fan of technology and fashion and you can spend thousand dollars,then you can afford clothes that change color on demand.




    The Famous London designer Amy Rainbow Winters Launch at high-tech International CES in Las Vegas a dress made with a textile containing fiber.

    Dress emits blue light. But the color can change fingertip, using its integrated sensors.

    If you want purple color, the dress will be in purple color. If you preferred, you red color. You just look at the handle and choose the color you want,

    The designer works with technology specialists to use the necessary materials for the clothes she designs. Some react to   Some to sound, Some with sun and water.

    Another dress presented at CES includes motion sensors and color changes when the wearer jumps or Moves.

    If someone’s glasses Google , it may as well be wearing pants optical fiber,

    His creations are personalized and also used in music videos or commercials.And  She is not ready-to-wear.

    These are exhibits. But if someone have few thousand dollars in reserve, he may have that dress,

    Manufacturing dresses fiber costs about 3 thousand dollars, but the price can go up depending your design of dress,
    Malicious ads published through Yahoo’s ad network delivered malware to thousands of sites visitors, according to reporter at Fox-IT, but Yahoo subsequently blocked that attack. 

    Fox-IT’s post said that visitors who view the ads in their PC were redirected to a Magnitude exploit kit.This exploit use vulnerabilities in Java and installs a host of different malware, I.T Experts said,  ZeuS, Andromeda, and other famous ad-clicking malwares,Tinba and Necurs. The security company’s investigation told that start of that attack is on December 30 but it might have begun earlier.

















    Yahoo confirmed the infection news and said they had removed. Yahoo told, we take the safety and privacy of our users as our first priority. We recently identified an ad service to spread malware to some of our users. We removed that malware and we will check and block any ads being used for this type of activity activity, a reporter said via email.

    Using a sample of traffic and a infection rate of 9 %, Security researcher said that the malware infected about 27,000 user every hour. The most affected countries were  U.K. ,France and Romania.


    Valve's PC gaming platform Steam, which have almost 65 million users, appears to have been the latest victim of a Distributed Denial Of Service (DDoS) attack by Anonymous hackers. The Steam service is now down for maintenance, according to CVG, after being struck by network outages.

    Steam is now become the fourth large-scale gaming platform to be hit by DDoS attacks from Anonymous hackers in the last week. EA's games, Blizzard's Battle.net and League Of Legends are also been targeted.

    DDoS starts when hackers flood targeted servers or networks with artificial traffic, causing them to be suspended or  to slow to a crawl.

    The gaming media is reporting that a different hacker groups have claimed responsibility for that attacks. One group, DERP, claimed through there twitter account that they are responsible for the attacks on Origin and Battle.net also. CVG says that another group, chFTheCat, said it's part of the group that targeted Steam, but that this is still unconfirmed.

    It's a suspicious start of the year for Valve, who closed out 2013 on something a buzz; the first Steam Machines - Valve's bid for space in the living room - were unveiled, while the beta for the Linux-based Steam OS became available for installation.

    Apple denies ‘backdoor’ NSA access to iPhones





    Apple admitted that they never worked with the US National Security Agency (NSA) and is unaware of efforts to target its smartphones, the company said in response to reports that the spy agency had developed a system to hack into and monitor iPhones.

    According to Germany’s report this week that a secretive unit of the NSA, which is under fire for the extent and depth of its spying programs around the world, makes specialized gear and software to infiltrate and monitor a plethora of computing devices, including mobile phones.

    The report included an NSA graphic dated 2008 that outlined a system in development called DROPOUTJEEP, described as a “software implant” that allows infiltrators to push and pull and retrieve data from iPhones such as contact lists. Der Spiegel referred to it as a “trojan,” or malware that helps hackers get into protected systems.
    The report, that surfaced on Sunday, didn't counsel that Apple had cooperated with the United States of America spying agency on questionable backdoors.

    In a statement issued weekday, the NSA didn't investigate any specific allegations however same that its interest “in any given technology is driven by the utilization of that technology by foreign intelligence targets.”

    The USA pursues its intelligence mission with care to make sure that innocent users of these same technologies weren't affected,

    The iPhone was a comparatively innovative contrivance in 2008. It hit the market in 2007 and proceeded to assist revolutionize the movable business.

    Apple has never worked with the NSA to make a backdoor in any of our merchandise, together with iPhone. to boot, we've been unaware of this alleged NSA program targeting our merchandise,


    “We can still use our resources to remain prior to malicious hackers and defend our customers from security attacks, no matter who’s behind them.”


    Notorious Hacker's Team Named Anon Ghost Launch Operation Israel on Israel birthday 07/APRIL/2014 



    https://www.youtube.com/watch?v=XvdSBX3xBHg


    British man Named "Lauri Love" Arrested for hacking into US government systems



    Lauri Love, arrested in Suffolk, but now  has been released on bail until February.

    A 28-year-old British man(Hacker) has been arrested on suspicion of hacking into US military and US government computer systems.



    Lauri Love, arrested in Suffolk under theAct of Computer Misuse,but now has been released on bail until February.

    The US authorities claim he placed "back doors/Trojon" in hacked networks to steal information.

    The arrest was a joint investigation by the UK's National Crime Agency and the FBI.

    According to the US governments, the arrested Hacker hacked into systems of the US Army, Nasa and the Environmental Protection Agency, among other Sensitive Sites.

    Security Experts in Berlin have worked out a Vulnerability that can block calls and text messages for Surrounding people connected to the same Mobile network, using just a Motorola C1 series phone



    The Security Experts, of the Technical University of Berlin, presented a Vulnerability last week outlining the technique that blocks calls and texts.

    By Making some modifications phones nearby area can experience a 'jam' on their phone meaning no incoming calls or texts will be delivered.

    The Vulnerability is based on an open-source baseband code to write replacement software for Motorola's popular C1 series of phones, can affect anyone within a 75 mile radius on the same cellular network.

    According to a report by Experts, it is explained that the method operates on the second-generation (2G) GSM networks, the most commonly used network worldwide.

    Bangkok Shopping Mall Most Photographed Location On Instagram.




    what would you say is which is the most photographed location on Instagram? you would possibly assume somewhere just like the Europe, Taj Mahal, Eiffel Tower or maybe city district. however that honor does not attend any of these sites. It goes to a shopping precinct in Krung Thep. Instagram told  that Thailand Paragon is that the planet's most "Instagrammed" spot for 2013. range 2 was city district and range 3 was funfair in California. Instagram will not say what percentage photos were taken at the mall. however Kingdom of Thailand Paragon gets photographed lots as a result of several celebrities go there to post photos of themselves. And with several children flocking there daily — and Asian nation being one among the world's biggest users of social media — the five-story mall could be a natural because the most photographed spot within the world in Instagram land.

    Connect With Us

    Recommend us on Google!

    Popular Posts

    Popular Posts

    • Snapchat hacked and 4.6million users details Leaked.
    • Several indian sites Hacked And Defaced By HaXoriouX MinD
    • Malware delivered through Yahoo ads.
    • Top 15 pinging website list for blog or website
    • How To Earn Money Online with Google Adsense.
    • British man Named "Lauri Love" Arrested for hacking into US government systems
    • Get Google Adsense Account Without any Website.
    • Google Shows Startups How to Master SEO in 10 Minutes
    • Valve Steam hit by DDoS attack.
    • Vigo Bluetooth Device keeps you alert after a tiring day.

    Recent Posts

    • Comments
    • Tags
    Cyberspace Defacement Online Earning SEO

    Latest From

    About Us

    Spice Mag - Premium free blogger template developed by spicytricks.com.

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Maecenas hendrerit iaculis nunc. Curabitur in eros ipsum. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Duis at mi justo, non suscipit elit. Nunc aliquam luctus adipiscing. Nullam sit amet lacus vitae odio congue mollis eu non magna. Duis sed arcu a libero adipiscing rhoncus. Aliquam erat volutpat. Suspendisse sed nunc metus, sed aliquet arcu.

    Quick Links

    • Cyberspace
    • Defacement
    • Online Earning
    • SEO

    Follow Us

    Copyright 2012 THE HAXOR NEWS. All rights reserved.

    Designed by spicytricks.